Starker Schutz durch starke Passwörter

Die jüngsten Hackerangriffe in Deutschland haben gezeigt: Starke Passwörter sind für Unternehmen überlebenswichtig. IT-Abteilungen brauchen ein einfaches und effizientes Tool für starke Passwörter. So können die Mitarbeiter Verantwortung für ihre eigene Sicherheit übernehmen. „Wie konnte ein 20-Jähriger diesen Riesenhack... Read More

What is full-disk encryption?

In today’s threat landscape, encryption is a necessary component of an organization’s security policy. Encryption is the process of changing information to make it unreadable by anyone except those possessing special knowledge (commonly referred to as a secret key) that allows them to change the... Read More

Specops Software

Identify and remove leaked passwords

Stockholm, June 25, 2019 – Specops Software announced today a new release of Specops Password Policy. The solution’s Blacklist Express, a downloadable leaked password list close to one billion passwords, now supports leaked password scanning. The solution enables you... Read More

lösenord problem

Keine Sicherheit ohne das richtige Passwort

„12345“, „passwort“ oder „hallo123“ – bei Millionen von Hackerangriffen auf die Firmen-IT sind solche oder ähnliche Passwörter leicht zu knacken. Für Unternehmen kann das existenzbedrohend werden. Es sei denn, sie implementieren eine wirksame Passwort-Policy.  Der Fall machte Schlagzeilen: Der... Read More

Specops Software

Self-service encryption key recovery for BitLocker

Stockholm, June 19, 2019 – Specops Software announced today a new release of Specops Key Recovery. The solution now provides self-service key recovery for devices encrypted with BitLocker. This allows users to unlock their devices with multi-factor authentication, without... Read More

How to deploy a MSI package with Group Policy?

Group Policy Software Installation (GPSI) was once hailed as a great incentive for all organizations to upgrade their NT4 domains to Active Directory.  It meant that there was no longer a need for those complex application deployment tools, it... Read More

Healthcare encryption standards

Protecting personal health data from unauthorized access is an essential part of HIPAA. Yet, even with stolen devices causing 45% of healthcare data breaches, many health organizations still don’t have encryption measures in place. Read More